Rui Chang
Orcid: 0000-0002-0178-0171
According to our database1,
Rui Chang
authored at least 86 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
GDNet: a low-light image enhancement network based on Ghost-Block and unique image decomposition.
J. Supercomput., January, 2025
2024
IEEE Trans. Software Eng., November, 2024
Controllability and control for discrete periodic systems based on fully-actuated system approach.
Int. J. Syst. Sci., September, 2024
RSTFusion: an end-to-end fusion network for infrared and visible images based on residual swin transfomer.
Neural Comput. Appl., August, 2024
RDGMEF: a multi-exposure image fusion framework based on Retinex decompostion and guided filter.
Neural Comput. Appl., July, 2024
How recommendation letters affect career Mobility:Evidence from a social networking sites LinkedIn.
Comput. Hum. Behav., March, 2024
ACM Trans. Softw. Eng. Methodol., February, 2024
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing.
IEEE Trans. Software Eng., January, 2024
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
The impact of manufacturing digital supply chain on supply chain disruption risks under uncertain environment - Based on dynamic capability perspective.
Adv. Eng. Informatics, 2024
Proceedings of the 25th International Middleware Conference, 2024
Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
DOA Estimation Based on Coherent Integration-Sparse Bayesian Learning With Time-Variant Gain-Phase Errors.
IEEE Trans. Aerosp. Electron. Syst., December, 2023
IEEE Trans. Software Eng., April, 2023
High-Temperature Oxidation of Magnesium- and Iron-Rich Olivine under a CO2 Atmosphere: Implications for Venus.
Remote. Sens., April, 2023
A task offloading algorithm for cloud-edge collaborative system based on Lyapunov optimization.
Clust. Comput., February, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Signal Process. Lett., 2023
Refinement-based Modeling and Formal Verification for Multiple Secure Partitions of TrustZone.
Int. J. Softw. Informatics, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023
VeriReach: A Formally Verified Algorithm for Reachability Analysis in Virtual Private Cloud Networks.
Proceedings of the IEEE International Conference on Web Services, 2023
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
2022
Lunar Terrestrial Analog Experiment on the Spectral Interpretations of Rocks Observed by the Yutu-2 Rover.
Remote. Sens., 2022
CoRR, 2022
A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system.
Concurr. Comput. Pract. Exp., 2022
Concurr. Comput. Pract. Exp., 2022
Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEE.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
RegVault: hardware assisted selective data randomization for operating system kernels.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
2021
CoRR, 2021
Effects of Data Augmentation Method Borderline-SMOTE on Emotion Recognition of EEG Signals Based on Convolutional Neural Network.
IEEE Access, 2021
Seeds of SEED: H<sup>2</sup>Cache: Building a Hybrid Randomized Cache Hierarchy for Mitigating Cache Side-Channel Attacks.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021
Proceedings of the APSys '21: 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 2021
2020
Predictive network modeling in human induced pluripotent stem cells identifies key driver genes for insulin responsiveness.
PLoS Comput. Biol., 2020
Determining the base address of MIPS firmware based on absolute address statistics and string reference matching.
Comput. Secur., 2020
2019
Spectral clustering algorithm using density-sensitive distance measure with global and local consistencies.
Knowl. Based Syst., 2019
Knowl. Based Syst., 2019
Neurocomputing, 2019
Implementing a hardware-assisted memory management mechanism for ARM platforms using the B method.
Concurr. Comput. Pract. Exp., 2019
2018
KSII Trans. Internet Inf. Syst., 2018
Towards a multilayered permission-based access control for extending Android security.
Concurr. Comput. Pract. Exp., 2018
Temperature-Dependent Surface Charge and Flashover Behaviors of Oil-Paper Insulation Under Impulse With Superimposed DC Voltage.
IEEE Access, 2018
Proceedings of the Third International Conference on Security of Smart Cities, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Concurr. Comput. Pract. Exp., 2017
Clust. Comput., 2017
MIPE: a practical memory integrity protection method in a trusted execution environment.
Clust. Comput., 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Biocomputing 2017: Proceedings of the Pacific Symposium, 2017
Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
2016
Quarter-Century Offshore Winds from SSM/I and WRF in the North Sea and South China Sea.
Remote. Sens., 2016
A Case Study of Land-Surface-Temperature Impact from Large-Scale Deployment of Wind Farms in China from Guazhou.
Remote. Sens., 2016
An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment.
Proceedings of the 6th International Conference on Communication and Network Security, 2016
A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Offshore Wind Resources Assessment from Multiple Satellite Data and WRF Modeling over South China Sea.
Remote. Sens., 2015
Proceedings of the Biocomputing 2015: Proceedings of the Pacific Symposium, 2015
2014
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2011
A Novel Knowledge-Driven Systems Biology Approach for Phenotype Prediction upon Genetic Intervention.
IEEE ACM Trans. Comput. Biol. Bioinform., 2011
PLoS Comput. Biol., 2011
2010
Novel algorithm for Bayesian network parameter learning with informative prior constraints.
Proceedings of the International Joint Conference on Neural Networks, 2010
A Novel Knowledge-driven Systems Biology Approach for Phenotype Prediction Upon Genetic Intervention.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2010
2009
2008
PhD thesis, 2008
Quantitative Inference by Qualitative Semantic Knowledge Mining with Bayesian Model Averaging.
IEEE Trans. Knowl. Data Eng., 2008
Modeling semantics of inconsistent qualitative knowledge for quantitative Bayesian network inference.
Neural Networks, 2008
2007
Proceedings of the International Joint Conference on Neural Networks, 2007
A Knowledge-based Dynamic Bayesian Framework Towards Molecular Network Modeling and Quantitative Prediction.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2007
Consistent Modeling, Integration and Simulation of Molecular Interaction Networks in Space-Time Dimension.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007